wunderwuzzi23 / KoiPhish
A simple yet beautiful phishing proxy.
☆52Updated 3 years ago
Alternatives and similar repositories for KoiPhish:
Users that are interested in KoiPhish are comparing it to the libraries listed below
- Automatically spin up infra for phishing☆63Updated 5 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆59Updated 6 years ago
- Provides access to libhashcat☆30Updated 11 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Sp00fer blog post -☆26Updated 2 years ago
- MimeCast Password Spraying Tool☆44Updated 5 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆31Updated 5 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- ☆16Updated 7 years ago
- Enumerate RIDs using pure Python☆31Updated 7 months ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Eating 2FA for Breakfast☆58Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 5 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆108Updated 4 months ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- wordlists for password cracking☆27Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆27Updated 2 years ago